Home | History | Annotate | Download | only in password_manager

Lines Matching defs:form

53       // Basic HTML form.
57 // HTML form with path.
61 // Secure HTML form with path.
148 PasswordForm* form = new PasswordForm();
149 form->scheme = form_data.scheme;
150 form->preferred = form_data.preferred;
151 form->ssl_valid = form_data.ssl_valid;
152 form->date_created = base::Time::FromDoubleT(form_data.creation_time);
154 form->signon_realm = std::string(form_data.signon_realm);
156 form->origin = GURL(form_data.origin);
158 form->action = GURL(form_data.action);
160 form->submit_element = WideToUTF16(form_data.submit_element);
162 form->username_element = WideToUTF16(form_data.username_element);
164 form->password_element = WideToUTF16(form_data.password_element);
166 form->username_value = WideToUTF16(form_data.username_value);
168 form->password_value = WideToUTF16(form_data.password_value);
170 form->blacklisted_by_user = true;
172 return form;
198 PasswordForm* form = forms[i];
200 EXPECT_EQ(expectation->scheme, form->scheme) << test_label;
201 EXPECT_EQ(std::string(expectation->signon_realm), form->signon_realm)
203 EXPECT_EQ(GURL(expectation->origin), form->origin) << test_label;
204 EXPECT_EQ(GURL(expectation->action), form->action) << test_label;
205 EXPECT_EQ(WideToUTF16(expectation->submit_element), form->submit_element)
208 form->username_element) << test_label;
210 form->password_element) << test_label;
213 form->username_value) << test_label;
215 form->password_value) << test_label;
217 EXPECT_TRUE(form->blacklisted_by_user) << test_label;
219 EXPECT_EQ(expectation->preferred, form->preferred) << test_label;
220 EXPECT_EQ(expectation->ssl_valid, form->ssl_valid) << test_label;
222 form->date_created.ToDoubleT()) << test_label;
280 PasswordForm form;
282 *keychain_, keychain_item, &form);
286 EXPECT_EQ(expected[i].scheme, form.scheme) << "In iteration " << i;
287 EXPECT_EQ(GURL(expected[i].origin), form.origin) << "In iteration " << i;
288 EXPECT_EQ(expected[i].ssl_valid, form.ssl_valid) << "In iteration " << i;
289 EXPECT_EQ(std::string(expected[i].signon_realm), form.signon_realm)
292 EXPECT_EQ(WideToUTF16(expected[i].username), form.username_value)
294 EXPECT_EQ(WideToUTF16(expected[i].password), form.password_value)
296 EXPECT_FALSE(form.blacklisted_by_user) << "In iteration " << i;
298 EXPECT_TRUE(form.blacklisted_by_user) << "In iteration " << i;
301 form.date_created.UTCExplode(&exploded_time);
319 PasswordForm form;
321 *keychain_, keychain_item, &form);
334 // An HTML form we've seen.
341 // An HTML form we haven't seen
381 // Check matches treating the form as a fill target.
387 // Check matches treating the form as a merging target.
402 // Changes just the origin path of |form|.
403 static void SetPasswordFormPath(PasswordForm* form, const char* path) {
407 form->origin = form->origin.ReplaceComponents(replacement);
410 // Changes just the signon_realm port of |form|.
411 static void SetPasswordFormPort(PasswordForm* form, const char* port) {
415 GURL signon_gurl = GURL(form->signon_realm);
416 form->signon_realm = signon_gurl.ReplaceComponents(replacement).spec();
419 // Changes just the signon_ream auth realm of |form|.
420 static void SetPasswordFormRealm(PasswordForm* form, const char* realm) {
424 GURL signon_gurl = GURL(form->signon_realm);
425 form->signon_realm = signon_gurl.ReplaceComponents(replacement).spec();
444 // Create a base form and make sure we find a match.
486 EXPECT_EQ(NULL, match) << "In modified version " << j << " of base form "
589 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
592 owned_keychain_adapter.RemovePassword(*form));
595 PasswordForm* match = keychain_adapter.PasswordExactlyMatchingForm(*form);
881 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
883 owned_keychain_adapter.AddPassword(*form);
981 // case where a form is filled, then the stored login is removed, then the
982 // form is submitted.
991 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
993 store_->UpdateLogin(*form);